摘要 :
Study on complex networks illustrates systems of real-world in disparate realms that incorporates a range of biological networks to technological systems and has, over the past years, become one of the most important and fascinati...
展开
Study on complex networks illustrates systems of real-world in disparate realms that incorporates a range of biological networks to technological systems and has, over the past years, become one of the most important and fascinating fields of the interdisciplinary research center. These complex networks share many topological features such as the small-worldness, scale-freeness, the existence of motifs and graphlets and self-similarity. In most cases, complex and real-networks are very large, and the description and analysis of them in explicit form is often faced with difficulty. We manage to head off aforementioned troubles by examining successful models amongst communication networks in some particular aspects, including important factors such as cost, security, integrity, scalability, and fault tolerant. The last factor is distinctly important for each communication network. Recently, some methods and mechanisms have been proposed to increase and improve the robustness of network by modifying its topology. The rewiring is the mechanism amongst the defensive strategies to increase the resilience of attacked networks in which the affected nodes are disconnected from faulty nodes and, possibly, connect to another profitable node with a specific probability. In this paper, a rewiring mechanism based on Shannon entropy concept is proposed to streamline the complex networks configuration in order to improve their resiliency. Network entropy is a quantitative criterion for describing its robustness and is acknowledged as one of the topological characteristic criteria. In practice, this quantity is related to the capacity of the network to tolerate changes in its configuration under various environmental constraints. We evaluate the network robustness based on the spectrum of degree distribution, heterogeneity, as well as the average size of the largest connected cluster during removing nodes with a sequence of systematic attacks based on the degree, betweenness, and Dangalchev's closeness centralities. The proposed rewiring strategy is applied over six synthetic networks and six real datasets, and then we verified that through approximately 30% swapping of links, the overall robustness of networks can be reached.
收起
摘要 :
The consequences of Global Software Development (GSD) on software development processes are evolutionary. It has reshaped and reformed the traditional software development approaches. The preferences of the developers and prioriti...
展开
The consequences of Global Software Development (GSD) on software development processes are evolutionary. It has reshaped and reformed the traditional software development approaches. The preferences of the developers and priorities of the client have tre
收起
摘要 :
Electrochemical water splitting is the most promising pathway to produce high-purity hydrogen to alleviate global energy crisis. This reaction demands inexpensive, efficient and robust electrocatalyst for its commercial use. Herei...
展开
Electrochemical water splitting is the most promising pathway to produce high-purity hydrogen to alleviate global energy crisis. This reaction demands inexpensive, efficient and robust electrocatalyst for its commercial use. Herein, we demonstrate an effective, facile and scalable method for the synthesis of cerium doped Ni3Fe nanostructures as an electrocatalyst for oxygen evolution reaction (OER) by following simple chemical bath deposition route. The different molar ratios (3, 6 and 12 mM) of cerium in the chemical bath were used to study its effect on the structural and the electrochemical properties of the Ni3Fe nanostructured films. Doping of cerium contents induced variations in the morphology of deposited Ni3Fe nanostructures. The optimized electrocatalyst Ni3Fe/Ce-6 yielded high surface area catalyst nanosheets uniformly deposited on three-dimensional conductive scaffold to ensure increase in the exposure of doped Ni3Fe catalytic sites with high electrical conductivity. As a result, this earth-abundant electrocatalyst affords high OER performance with a small overpotential of 310 mV versus reversible hydrogen electrode (RHE) at 10 mA cm-2 and retains good stability up to ~ 10 h in alkaline electrolyte. This scalable strategy has great potential in future advancement of efficient and low-cost electrocatalysts for their large-scale application in energy conversion systems.
收起
摘要 :
The main objective of the research is to propose the effective methods of using two-dimensional n×n passwords in terms of providing secure authentication to inactive users of the system during vulnerable state. The proposition is...
展开
The main objective of the research is to propose the effective methods of using two-dimensional n×n passwords in terms of providing secure authentication to inactive users of the system during vulnerable state. The proposition is based on the fact that if the system goes in to unsafe state due to some intrusion threat then to make the system available to the end user, it is required by the users to re-authenticate using special mechanism. These users can become active once authenticated and can continue their tasks using alternate services. These n×n passwords are long and complex, hence are difficult to memorize. But these can be very useful in certain alarming situations such as in case of system being under threat. Proposed methods provide the maximum benefits in terms of secure authentication to the system resources that is under threat. Three methods have been proposed that are classified on the way the password is created or generated. The strength and limitations of all the proposed methods has also been analyzed.
收起
摘要 :
The main objective of the research is to propose the effective methods of using two-dimensional nxn passwords in terms of providing secure authentication to inactive users of the system during vulnerable state. The proposition is ...
展开
The main objective of the research is to propose the effective methods of using two-dimensional nxn passwords in terms of providing secure authentication to inactive users of the system during vulnerable state. The proposition is based on the fact that if the system goes in to unsafe state due to some intrusion threat then to make the system available to the end user, it is required by the users to re-authenticate using special mechanism. These users can become active once authenticated and can continue their tasks using alternate services. These nxn passwords are long and complex, hence are difficult to memorize. But these can be very useful in certain alarming situations such as in case of system being under threat. Proposed methods provide the maximum benefits in terms of secure authentication to the system resources that is under threat. Three methods have been proposed that are classified on the way the password is created or generated. The strength and limitations of all the proposed methods has also been analyzed.
收起
摘要 :
The tuberculosis (TB) disease is still widely found even though BCG vaccine given to many people. Ineffectiveness of the BCG vaccine is one of causes that make the difficulties in preventing TB transmission. Objective of the resea...
展开
The tuberculosis (TB) disease is still widely found even though BCG vaccine given to many people. Ineffectiveness of the BCG vaccine is one of causes that make the difficulties in preventing TB transmission. Objective of the research was to determine the immunogenicity of KatG protein of M. tuberculosis clinical isolate L19 in mice. The KatG protein as antigen was prepared by expression of the katG gene of M. tuberculosis clinical isolate L19 in Escherichia coli BL21 using pColdII-DNA vector. After purification by affinity chromatography, the KatG was vaccinated to mice to detect its immunogenicity. The expression of katG in E. coli BL21 could result in KatG protein with molecular weight 80 kDa in sodium dodecyl sulfate gel electrophoresis (SDS-PAGE). The pure KatG protein could significantly stimulate the immune response of mice by triggering the antibodies production of IgG1, IgG2a, IgG2b, IgG2c, IgG3, and IgM. The highest antibody level was obtained when the mice were vaccinated by KatG L19 with the dose of 45 μg/ml. Of the antibodies, the IgG2c isotype was dominantly produced in the blood serum. The KatG protein exhibited a high immunogenicity in mice, so it is possible to develop as a vaccine candidate for TB. A clinical test should be performed in a future to ensure its safety as a therapeutic protein.
收起
摘要 :
In this study, we have explained and elaborated the client's factor and interaction during software development project through model diagrams. This research presents the composite structure of client by analyzing the role it play...
展开
In this study, we have explained and elaborated the client's factor and interaction during software development project through model diagrams. This research presents the composite structure of client by analyzing the role it plays during software projects. Role of client is presented from both technical and nontechnical aspects. Key roles in a software team are identified and both intra-team interactions and client-team interactions are explained through an interaction overview model. A cross case analysis of real projects is performed to verify and validate the findings. Both client's composite structure and interaction overview model provide a deep understanding of clients and interaction strategies to the researchers and industry practitioners. The research predicts that future process models and framework would be purely based on client factor instead of heavy weight processes and standards.
收起
摘要 :
In this study, we have explained and elaborated the client?s factor and interaction during software development project through model diagrams. This research presents the composite structure of client by analyzing the role it play...
展开
In this study, we have explained and elaborated the client?s factor and interaction during software development project through model diagrams. This research presents the composite structure of client by analyzing the role it plays during software projects. Role of client is presented from both technical and non-technical aspects. Key roles in a software team are identified and both Intra-team interactions and client-team interactions are explained through an interaction overview model. A cross case analysis of real projects is performed to verify and validate the findings. Both client?s composite structure and interaction overview model provide a deep understanding of clients and interaction strategies to the researchers and industry practitioners. The research predicts that future process models and framework would be purely based on client factor instead of heavy weight processes and standards.
收起